Anonymous trace and revoke
From MaRDI portal
Publication:2349640
DOI10.1016/J.CAM.2013.10.019zbMATH Open1338.94056OpenAlexW2081810838MaRDI QIDQ2349640FDOQ2349640
Authors: Murat Ak, Ali Aydın Selçuk, Serdar Pehlivanoglu
Publication date: 17 June 2015
Published in: Journal of Computational and Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cam.2013.10.019
Recommendations
broadcast encryptionprivacyanonymitydigital rights managementdigital content distributiontrace and revoke
Cites Work
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Title not available (Why is that?)
- Collusion-secure fingerprinting for digital data
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Improving the round complexity of traitor tracing schemes
- Outsider-anonymous broadcast encryption with sublinear ciphertexts
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Cited In (7)
- Efficient fully anonymous public-key trace and revoke with adaptive \textsf{IND-CCA} security
- A Revocation Scheme Preserving Privacy
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
- Arrangements of pseudocircles: triangles and drawings
- Mediated traceable anonymous encryption
This page was built for publication: Anonymous trace and revoke
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2349640)